Your message dated Fri, 22 May 2015 18:52:35 +0000
with message-id <e1yvs3f-0006t5...@franck.debian.org>
and subject line Bug#754201: fixed in zendframework 1.11.13-1.1+deb7u1
has caused the Debian Bug report #754201,
regarding Potential SQL injection in the ORDER implementation of Zend_Db_Select 
(ZF2014-04)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
754201: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754201
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: zendframework
Version: 1.12.5-0.1
Severity: grave
Tags: security upstream patch

Affected versions: v1.12.0 up to v1.12.6 (Squeeze and Wheezy are not
affected)
Upstream security issue:
        http://framework.zend.com/security/advisory/ZF2014-04
Upstream patch:
        
https://github.com/zendframework/zf1/commit/da09186c60b9168520e994af4253fba9c19c2b3d

Regards

David

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: zendframework
Source-Version: 1.11.13-1.1+deb7u1

We believe that the bug you reported is fixed in the latest version of
zendframework, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 754...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Prévot <taf...@debian.org> (supplier of updated zendframework package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 14 May 2015 11:50:05 -0400
Source: zendframework
Binary: zendframework zendframework-bin zendframework-resources
Architecture: source all
Version: 1.11.13-1.1+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Frank Habermann <lordla...@lordlamer.de>
Changed-By: David Prévot <taf...@debian.org>
Description: 
 zendframework - powerful PHP framework
 zendframework-bin - binary scripts for zendframework
 zendframework-resources - resource scripts for zendframework
Closes: 743175 754201
Changes: 
 zendframework (1.11.13-1.1+deb7u1) wheezy-security; urgency=high
 .
   * Track Wheezy updates in the wheezy branch
   * Handle patches with gbp pq
   * Fix ZF2014-01: Potential XXE/XEE attacks.
     Numerous components utilizing PHP's DOMDocument, SimpleXML, and
     xml_parse functionality were vulnerable.
     http://framework.zend.com/security/advisory/ZF2014-01
     [CVE-2014-2681] [CVE-2014-2682] [CVE-2014-2683] (Closes: #743175)
   * Fix ZF2014-02: Security fix for OpenID.
     Potential security issue in login mechanism of ZendOpenId and
     Zend_OpenId consumer.
     http://framework.zend.com/security/advisory/ZF2014-02
     [CVE-2014-2684] [CVE-2014-2685] (Closes: #743175)
   * Fix ZF2014-04: Potential SQL injection.
     The implementation of the ORDER BY SQL statement in Zend_Db_Select of
     Zend Framework 1 contains a potential SQL injection when the query
     string passed contains parentheses.
     http://framework.zend.com/security/advisory/ZF2014-04
     [CVE-2014-4914] (Closes: #754201)
   * Fix ZF2014-05: Potential XML eXternal Entity injection vectors
     http://framework.zend.com/security/advisory/ZF2012-05
     [CVE-2014-8088]
   * Fix ZF2014-06: SQL injection vector when manually quoting values
     http://framework.zend.com/security/advisory/ZF2014-06
     [CVE-2014-8089]
   * Fix ZF2015-04: CRLF injections in HTTP and Mail
     http://framework.zend.com/security/advisory/ZF2015-04
     [CVE-2015-3154]
Checksums-Sha1: 
 02d0223186e9c574e8437f77951beceb6abfe0d4 1586 
zendframework_1.11.13-1.1+deb7u1.dsc
 b0921984bd2edc64a238c0a8db2f5be57844a751 20217474 
zendframework_1.11.13.orig.tar.gz
 d698e345665c918ab97e4a38879133d84321a568 36049 
zendframework_1.11.13-1.1+deb7u1.diff.gz
 be9ee1a3a4e94418e909b0f312127b745070d4cc 3734178 
zendframework_1.11.13-1.1+deb7u1_all.deb
 990965b1df9f06e2bab92f127c27f5f7a5d3a185 10558 
zendframework-bin_1.11.13-1.1+deb7u1_all.deb
 8b281411d52c3e3187f9d7ab2b6babc648035616 38912 
zendframework-resources_1.11.13-1.1+deb7u1_all.deb
Checksums-Sha256: 
 a1e351f7898b3cc30b1fc8846cb30924c0e75884ab364f521391fbbeaf43148f 1586 
zendframework_1.11.13-1.1+deb7u1.dsc
 2d7349ae9133bd4fee39c5c7ab605c70d3a6db89bca229b4105a9b53b6a12996 20217474 
zendframework_1.11.13.orig.tar.gz
 f64c6619a7ccb6603d3454816ea95c4a3584dbe453a6b8dde0349ff6d8009f94 36049 
zendframework_1.11.13-1.1+deb7u1.diff.gz
 5d04f52220bdd6c2f3e28505abcea4de222572a0f658f39b6f0822939ccd1770 3734178 
zendframework_1.11.13-1.1+deb7u1_all.deb
 29eacc71f3d35b5bdabd64d578afd1a47f2d342ecd11331880011a960eb98530 10558 
zendframework-bin_1.11.13-1.1+deb7u1_all.deb
 f7e8d6e2b980761481060d972d8ee44105fc8ec17627ad3c2b5e2b0007991c5d 38912 
zendframework-resources_1.11.13-1.1+deb7u1_all.deb
Files: 
 d22165ce2e08e5d1006cf05c3ec748e2 1586 web optional 
zendframework_1.11.13-1.1+deb7u1.dsc
 db77b24f2ad4dbaf36f2a5b517522780 20217474 web optional 
zendframework_1.11.13.orig.tar.gz
 a43fc9d45858090df087f3dae3a113a8 36049 web optional 
zendframework_1.11.13-1.1+deb7u1.diff.gz
 35bee7246dfdae19e4d4c54fa5a8b561 3734178 web optional 
zendframework_1.11.13-1.1+deb7u1_all.deb
 ab5e9d4aabb8f3a215b48c3f75e1c125 10558 web optional 
zendframework-bin_1.11.13-1.1+deb7u1_all.deb
 adff59c83b2454d0879865f2b986c820 38912 web optional 
zendframework-resources_1.11.13-1.1+deb7u1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJVVMb/AAoJEAWMHPlE9r08VSMH/im0BMokSzAtuGQ/a+mxeEft
H3FVo96I4w8J/o3NKCAy2nfsLA9jTOiKHzfz/LQ4o0sBh3mzEqsZiovEuq9XYRH6
dfAPL8Av8TPTsPaMxUl4cAQc/rllp4OyeOILETw9xaeA+MEdyV/zNiBJKTxJIR8q
Nwt77M6AT3dyz1xQjq2/3zcMUSCRDnrlHIo0D09rNLKWHvjL3drJ1D6TFJwhRqq5
TAtGfUZ1dWfbicES7OHqDhQo2MBgsbtUtnNrCW1cHeLVUcQGbg7r8ozwpphpl7xY
cGv3QVnclzhV+r8nemPbB1dCpdK0mfc/rnL+Nsfc/ooUWRBIzX+VgOIJiW9WE4Q=
=4CgT
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to